PJobRAT reemerges, attempts once more at chat applications
Reported by researchers in the year 2021, PJobRAT – an Android RAT initially identified in 2019 – has been focusing...
Reported by researchers in the year 2021, PJobRAT – an Android RAT initially identified in 2019 – has been focusing...
The actors responsible for the Medusa ransomware-as-a-service (RaaS) campaign have utilized a malevolent driver known as ABYSSWORKER in executing a...
A recent malicious software scheme has been detected using deceptive strategies to execute a freely available rootkit known as r77....
UNC3886, the China-linked cyber infiltration squad, has been spotted aiming for outdated MX routers from Juniper Networks in a scheme...
An organized cyber threat group named EncryptHub has been identified executing advanced phishing schemes to disseminate data theft tools and...
A cybercriminal group, Lotus Panda, has been detected focusing on government, manufacturing, telecommunications, and media industries in areas such as...
Crafted By Sakshi Jaiswal There has been a recent upswing in phishing schemes identified by McAfee Labs. These campaigns use counterfeit popular...
Reports indicate that a fresh malicious scheme is targeting edge gadgets made by Cisco, ASUS, QNAP, and Synology to convert...
An attack distributing the XLoader malware has been detected using the DLL side-loading method through a valid tool linked to...
There have been reports of several threat actors associated with Russia targeting specific individuals through the secure messaging platform Signal...
Mustang Panda, a hacking group supported by the Chinese government, has been caught using an innovative method to outsmart detection...
The criminal groups responsible for the RansomHub ransomware-as-a-service (RaaS) platform have been seen exploiting recently fixed vulnerabilities in Microsoft Active...
There has been a wide-ranging phishing scheme detected that is utilizing fake PDF files stored on the Webflow content distribution...
There has been a discovery of a novel method employed by the group associated with North Korea - Kimsuky, in...
Perpetrators have been noticed using Google Tag Manager (GTM) to distribute credit card skimmer malware aimed at Magento-powered online stores....